Most major organisations working with Microsoft systems will use Active Directory (AD) to centrally authenticate all resources on a network based on a central database. The solution, in theory, is a way to centrally manage user security, which sounds appealing to large organisations. The reality, however, is that AD is not secure on its own..
If you follow tech news or the New York Times, you may have seen a story this month about Twitter CEO, Jack Dorsey, having his Twitter account hacked through an increasingly common tactic from hackers, SIM porting. A tactic which renders no mobile SIM 100% safe and therefore no SMS two-factor authentication solution totally safe…
Oh, data breaches. With every passing day there is another story in the tech news, and often even mainstream news, bringing to light a breach that exposed the personal data of thousands, if not millions of users, as well as the vulnerability of the organisations that should have been keeping it safe. If daily sounds..
July 2019 marked the passing of respected computer pioneer, Fernando Corbato, aged 93, who had a long and illustrious career in technology leaving many great legacies to the field of technology, including 50 years of passwords. Inventor of the password Dr Corbato is perhaps most famous for inventing the password. But this invention was actually..
Passwords, 2-factor authentication, multi-factor authentication – do you need to know what they mean? Or are we now entering the realm of x-factor authentication where the method used is essentially transparent to the user? Whichever authentication method is implemented, the focus has to be to ensure that it is fully compliant and that x-factor authentication..
In our latest article we look at how deviceless authentication can be effective at combating password breaches. For decades now, organisations, platforms and users have relied on passwords for security. The password has been entrusted as the gatekeeper, the single solution to keep information safe and solely in the hands of those with the code..
Authlogics wins Best Password Compliance & Replacement Specialists from AI Cyber Security Awards 2019
Authlogics has been presented with an award for Best Password Compliance & Replacement Specialists from the AI Cyber Security Awards 2019, acknowledging the innovation of its Password Policy Agent and Authentication Suite. Private and public sector organisations around the world are benefiting from Authlogics solutions, to ensure online accounts are operated with compliant passwords that..
Data breaches are regularly in the news. As hackers become more efficient and security policies begin to fail, it is becoming more glaringly obvious that most businesses are ill-equipped to fend off hackers and guarantee security against a corporate data breach. The fear now is not “will our company be hacked?” but “when will our..
Authlogics reveals that the recent Collection#1 password breach is just the tip of a 7.7 billion record iceberg
Yesterday was another big news day for the password security world as yet another sizable dump of username and passwords has been found on the web. Troy Hunt provides a well thought through post where he talks about his findings from the dump dubbed “Collection #1” containing as many as 773 million emails and password records,..
The enterprise IT environment of today couldn’t be more different from that of a decade ago. From cloud computing and AI to automation and VR, a host of advanced technologies are changing the way we work and network. And it’s not just enterprises that are getting more sophisticated: so too are cybercriminals. Instances of cybercrime..